https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Bug ID: 2228050
Summary: CVE-2023-3817 openssl3: OpenSSL: Excessive time spent
checking DH q parameter value [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2227852
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2228050
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2223821
Bug ID: 2223821
Summary: TRIAGE-CVE-2023-2975 openssl3: openSSL: AES-SIV cipher
implementation contains a bug that causes it to ignore
empty associated data entries [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2223016
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2223821
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2211109
Bug ID: 2211109
Summary: CVE-2023-2650 openssl3: openssl: Possible DoS
translating ASN.1 object identifiers [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2207947
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2211109
https://bugzilla.redhat.com/show_bug.cgi?id=2188526
Bug ID: 2188526
Summary: CVE-2023-1255 openssl3: openssl: Input buffer
over-read in AES-XTS implementation on 64 bit ARM
[epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2188461
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2188526
https://bugzilla.redhat.com/show_bug.cgi?id=2182602
Bug ID: 2182602
Summary: CVE-2023-0466 openssl3: openssl: Certificate policy
check not enabled [epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: trathi(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2182565
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2182602
https://bugzilla.redhat.com/show_bug.cgi?id=2182590
Bug ID: 2182590
Summary: CVE-2023-0465 openssl3: openssl: Invalid certificate
policies in leaf certificates are silently ignored
[epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: openssl3
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: michel(a)michel-slm.name
Reporter: trathi(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
michel(a)michel-slm.name
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2182561
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2182590
https://bugzilla.redhat.com/show_bug.cgi?id=2271766
Bug ID: 2271766
Summary: kyua: please provide epel9 package
Product: Fedora
Version: rawhide
OS: Linux
Status: NEW
Component: kyua
Severity: medium
Assignee: jonathan(a)almalinux.org
Reporter: denis(a)fateyev.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org
Target Milestone: ---
Classification: Fedora
Description of problem:
Please provide "kyua" package in EPEL9.
Bug has been opened against rawhide, since there were no "kyua" packages in
EPEL earlier.
Reproducible: Always
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2271766
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2268572
Bug ID: 2268572
Summary: kyua: create epel{7,8,9} builds
Product: Fedora
Version: rawhide
URL: https://copr.fedorainfracloud.org/coprs/pemensik/atf/
OS: Linux
Status: NEW
Component: kyua
Keywords: RFE
Severity: medium
Assignee: jonathan(a)almalinux.org
Reporter: pemensik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org
Target Milestone: ---
Classification: Fedora
I have made my copr pemensik/atf with atf at [1]. I would like to have easier
way to install kyua and its dependencies, which are atf and lutok.
I am aware those tools are basically with dead upstream. I sometime want to
test bind 9.16 or older with unit tests. I had to fiddle somehow to make also
s390x builds. It would be simpler if I could do that directly on epel branches.
Only few minor changes are needed for building them for rhel7 and rhel8. We had
internal kyua builds, but those seem to be untagged even from internal
buildroot.
It would be phased out anyway, but if there are few things to keep them still
compiled, it would help me. CentOS builds would stay still for some time.
Sources moved to:
- https://github.com/freebsd/atf
- https://github.com/freebsd/lutok
- https://github.com/freebsd/kyua
While very little activity is there, still a tiny bit better that none.
I would be willing to do simple fixes either to epel or fedora, if my time
allows that. Could you please make branches and add me as epel assignee with
commit rights?
Some of my changes are at my fork [2].
1. https://copr.fedorainfracloud.org/coprs/pemensik/atf/
2. https://src.fedoraproject.org/fork/pemensik/rpms/atf
Reproducible: Always
Steps to Reproduce:
1. Use CentOS any version
2. dnf install kyua
3.
Actual Results:
# dnf list kyua\* --disablerepo=copr:copr.fedorainfracloud.org:pemensik:atf
--enablerepo=epel --available
Updating Subscription Management repositories.
Unable to read consumer identity
This system is not registered with an entitlement server. You can use "rhc" or
"subscription-manager" to register.
Last metadata expiration check: 2:07:22 ago on Fri 08 Mar 2024 04:07:11 AM EST.
Error: No matching Packages to list
Expected Results:
# dnf list kyua\* --enablerepo=epel --available
Updating Subscription Management repositories.
Unable to read consumer identity
This system is not registered with an entitlement server. You can use "rhc" or
"subscription-manager" to register.
Last metadata expiration check: 2:07:40 ago on Fri 08 Mar 2024 04:07:11 AM EST.
Available Packages
kyua.src 0.13-15.el9
copr:copr.fedorainfracloud.org:pemensik:atf
kyua-debuginfo.s390x 0.13-15.el9
copr:copr.fedorainfracloud.org:pemensik:atf
kyua-debugsource.s390x 0.13-15.el9
copr:copr.fedorainfracloud.org:pemensik:atf
kyua-tests.s390x 0.13-15.el9
copr:copr.fedorainfracloud.org:pemensik:atf
kyua-tests-debuginfo.s390x 0.13-15.el9
copr:copr.fedorainfracloud.org:pemensik:atf
but with epel repos
Depends on bug #2268570
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2268572
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…